{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.01025","arxiv_id":"2605.01025","integrity":{"available":true,"endpoint":"/pith/2605.01025/integrity.json","summary":{"critical":3,"advisory":15,"informational":0,"by_detector":{"doi_compliance":{"total":18,"critical":3,"advisory":15,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T18:39:40.901207Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T17:41:47.135511Z","findings_count":18}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.1910.08820.url:http://arxiv.org/abs/1910.08820) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.48550/arXiv.1910.08820.url:http://arxiv.org/abs/1910.08820","detected_arxiv_id":null,"ref_index":36,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.4230/lipics.aft.2024.30.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2024.30) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.4230/lipics.aft.2024.30.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2024.30","detected_arxiv_id":null,"ref_index":15,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/SP46215.2023.10179444.url:https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.10179444) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/SP46215.2023.10179444.url:https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.10179444","detected_arxiv_id":null,"ref_index":5,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-47751-5_9.url:https://doi.org/10.1007/978-3-031-47751-5_9) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-031-47751-5_9.url:https://doi.org/10.1007/978-3-031-47751-5_9","detected_arxiv_id":null,"ref_index":16,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/SPW59333.2023.00008.url:https://ieeexplore.ieee.org/abstract/document/10188634) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/SPW59333.2023.00008.url:https://ieeexplore.ieee.org/abstract/document/10188634","detected_arxiv_id":null,"ref_index":6,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.tcs.2019.02.001.url:https://www.sciencedirect.com/science/article/pii/S030439751930091X) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/j.tcs.2019.02.001.url:https://www.sciencedirect.com/science/article/pii/S030439751930091X","detected_arxiv_id":null,"ref_index":17,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/SP61157.2025.00061.url:https://www.computer.org/csdl/proceedings-article/sp/2025/223600a061/21B7R6HnWWk) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1109/SP61157.2025.00061.url:https://www.computer.org/csdl/proceedings-article/sp/2025/223600a061/21B7R6HnWWk","detected_arxiv_id":null,"ref_index":24,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.4230/LIPIcs.AFT.2024.22.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2024.22) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.4230/LIPIcs.AFT.2024.22.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2024.22","detected_arxiv_id":null,"ref_index":57,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1145/3487552.3487811.url:https://doi.org/10.1145/3487552.3487811' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1145/3487552.3487811.url:https://doi.org/10.1145/3487552.3487811","detected_arxiv_id":null,"ref_index":63,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-18283-9_28.url:https://doi.org/10.1007/978-3-031-18283-9_28) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-031-18283-9_28.url:https://doi.org/10.1007/978-3-031-18283-9_28","detected_arxiv_id":null,"ref_index":75,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3719027.3744852.url:https://doi.org/10.1145/3719027.3744852) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/3719027.3744852.url:https://doi.org/10.1145/3719027.3744852","detected_arxiv_id":null,"ref_index":52,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3555776.3577655.url:https://doi.org/10.1145/3555776.3577655) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/3555776.3577655.url:https://doi.org/10.1145/3555776.3577655","detected_arxiv_id":null,"ref_index":59,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1002/fut.22556.url:https://onlinelibrary.wiley.com/doi/abs/10.1002/fut.22556) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1002/fut.22556.url:https://onlinelibrary.wiley.com/doi/abs/10.1002/fut.22556","detected_arxiv_id":null,"ref_index":73,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1145/3805637.url:https://doi.org/10.1145/3805637' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1145/3805637.url:https://doi.org/10.1145/3805637","detected_arxiv_id":null,"ref_index":91,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1145/3771566.url:https://doi.org/10.1145/3771566' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1145/3771566.url:https://doi.org/10.1145/3771566","detected_arxiv_id":null,"ref_index":58,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.4230/lipics.aft.2025.27.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2025.27) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.4230/lipics.aft.2025.27.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2025.27","detected_arxiv_id":null,"ref_index":69,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.4230/lipics.aft.2025.26.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2025.26) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.4230/lipics.aft.2025.26.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2025.26","detected_arxiv_id":null,"ref_index":82,"audited_at":"2026-05-19T17:41:47.135511Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3689931.3694911.url:https://doi.org/10.1145/3689931.3694911) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1145/3689931.3694911.url:https://doi.org/10.1145/3689931.3694911","detected_arxiv_id":null,"ref_index":92,"audited_at":"2026-05-19T17:41:47.135511Z"}],"snapshot_sha256":"38dabfe36d0a4e84b9ec8fac3458ab3156dcb6268805da9cba86d01f3db815dc"},"events":[{"event_id":2303,"event_type":"pith.integrity.v1","payload_sha256":"c8894bae54386f0de42d9aabb3e501b3fd85f23c738749bdd00cade129701e54","signature_b64":"fPE6fVlIaBJ9kmsasPpDUutsZbkZzpcG6hIaBSdDVf6RaUOoK9e9Dfd1OJHUFzJCFSqctdjFvrTfCiB/z1+iBQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.906180+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3689931.3694911.url:https://doi.org/10.1145/3689931.3694911) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Sen Yang, Fan Zhang, Ken Huang, Xi Chen, Youwei Yang, and Feng Zhu. “SoK: MEV Countermeasures”. In:Proceedings of the Workshop on Decentralized Finance and Security. DeFi ’24. Salt Lake City, UT, USA: Association for Computing Machinery, 20","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":92,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Sen Yang, Fan Zhang, Ken Huang, Xi Chen, Youwei Yang, and Feng Zhu. “SoK: MEV Countermeasures”. In:Proceedings of the Workshop on Decentralized Finance and Security. DeFi ’24. Salt Lake City, UT, USA: Association for Computing Machinery, 20","reconstructed_doi":"10.1145/3689931.3694911.url:https://doi.org/10.1145/3689931.3694911"},"severity":"advisory","ref_index":92,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3689931.3694911.url:https://doi.org/10.1145/3689931.3694911","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"cd521376cc728cd5ddf8e4c27a803bac886fba2309fa37a7ce2d71f805dbd19d","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2302,"event_type":"pith.integrity.v1","payload_sha256":"0ebc7737b55bb66c83ee2b3134b795cce93a763bc2e32061aa84b36c7d0e1c74","signature_b64":"nEZTHLf95ZJhnAwanKYBiyu2Y8wGTccRO7shztTTEg+riNNHi+n4sHhoUPh9VUjXNpB2tIBLRDhnQetrt5czAw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.905179+00:00","payload":{"note":"Identifier '10.1145/3805637.url:https://doi.org/10.1145/3805637' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Sen Yang, Burak Öz, Fei Wu, and Fan Zhang. “Geographical Centralization Resilience in Ethereum’s Block-Building Paradigms”. In:Proc. ACM Meas. Anal. Comput. Syst. 10.2 (June 2026).doi:10.1145/3805637.url:https://doi.org/10.1145/3805637","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"doi":"10.1145/3805637.url:https://doi.org/10.1145/3805637","arxiv_id":null,"ref_index":91,"raw_excerpt":"Sen Yang, Burak Öz, Fei Wu, and Fan Zhang. “Geographical Centralization Resilience in Ethereum’s Block-Building Paradigms”. In:Proc. ACM Meas. Anal. Comput. Syst. 10.2 (June 2026).doi:10.1145/3805637.url:https://doi.org/10.1145/3805637","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":91,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3805637.url:https://doi.org/10.1145/3805637","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"7a634501f3566e0836826ddb08bdd21b2138274bc222d562a75286c7085c403d","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2301,"event_type":"pith.integrity.v1","payload_sha256":"d61c3a113aa569c4600c90e99fd01c9a57ae73d2ec117f37f637d888976fd918","signature_b64":"ptBQKAeqdcs7bV38WFTfsqP+bbVMGcMOk+RKPjHZ8qP+Y5cUL3xSqJWMLi2GtMcjRozX5bvW+ZQj6H8QCI0fBw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.904064+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.4230/lipics.aft.2025.26.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2025.26) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Fei Wu, Danning Sui, Thomas Thiery, and Mallesh Pai. “Measuring CEX-DEX Ex- tracted Value and Searcher Profitability: The Darkest of the MEV Dark Forest”. In:7th Conference on Advances in Financial Technologies (AFT 2025). Ed. by Zeta Avari","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":82,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Fei Wu, Danning Sui, Thomas Thiery, and Mallesh Pai. “Measuring CEX-DEX Ex- tracted Value and Searcher Profitability: The Darkest of the MEV Dark Forest”. In:7th Conference on Advances in Financial Technologies (AFT 2025). Ed. by Zeta Avari","reconstructed_doi":"10.4230/lipics.aft.2025.26.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2025.26"},"severity":"advisory","ref_index":82,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.4230/lipics.aft.2025.26.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2025.26","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"f3c82be5cbb80af6104837714fa21b5526c931018b84e61370578d561f96a1f6","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2300,"event_type":"pith.integrity.v1","payload_sha256":"43dc7850d3b34d0e38b897f013041f0bf1bb20241e8df994e423367d5c0dbb44","signature_b64":"h5YKwA3iTSlaWR2ioA/lJr0S6CVe7ErZVO03jfeKRctYUGFVNYoINi5XSX3oKh8LpY7BnZ1CpIPIJBhdK4ZvAA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.902927+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-18283-9_28.url:https://doi.org/10.1007/978-3-031-18283-9_28) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, and David Tse. “Three Attacks on Proof-of-Stake Ethereum”. In:Financial Cryptography and Data Security: 26th International Conference, FC 2022, Grena","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":75,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, and David Tse. “Three Attacks on Proof-of-Stake Ethereum”. In:Financial Cryptography and Data Security: 26th International Conference, FC 2022, Grena","reconstructed_doi":"10.1007/978-3-031-18283-9_28.url:https://doi.org/10.1007/978-3-031-18283-9_28"},"severity":"advisory","ref_index":75,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-031-18283-9_28.url:https://doi.org/10.1007/978-3-031-18283-9_28","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"b9e0f5c8b4fff2d6ccc1e93e01d45af025c94142ddbe35f280acb3c3ce3ec96d","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2299,"event_type":"pith.integrity.v1","payload_sha256":"882ce7f2eebc7a91d915da77e2cb7b24868a583ef53ac54a67a933122a70a528","signature_b64":"moH7G/pg+4Lc/IRKQBxEGUvUF/gC6j7svvazq2z8hu0etqLq7PiKmKjNcX0nt5z3Z1RQfjHV5ecfMAS0A6xqCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.901863+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1002/fut.22556.url:https://onlinelibrary.wiley.com/doi/abs/10.1002/fut.22556) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Stefan Scharnowski and Hossein Jahanshahloo. “The Economics of Liquid Staking Derivatives: Basis Determinants and Price Discovery”. In:Journal of Futures Markets 45.2 (2025), pp. 91–117.doi:https://doi.org/10.1002/fut.22556.url:https: //onl","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":73,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Stefan Scharnowski and Hossein Jahanshahloo. “The Economics of Liquid Staking Derivatives: Basis Determinants and Price Discovery”. In:Journal of Futures Markets 45.2 (2025), pp. 91–117.doi:https://doi.org/10.1002/fut.22556.url:https: //onl","reconstructed_doi":"10.1002/fut.22556.url:https://onlinelibrary.wiley.com/doi/abs/10.1002/fut.22556"},"severity":"advisory","ref_index":73,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1002/fut.22556.url:https://onlinelibrary.wiley.com/doi/abs/10.1002/fut.22556","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"f96b3e7e64e0832f2868c4a5f427a8d1849c839f7ad9544c4f3a52eac1a980a6","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2298,"event_type":"pith.integrity.v1","payload_sha256":"5902f4ed2dee639a3f30df437d7276d05b71ec8f8321ee455fb812664c5edfbd","signature_b64":"yusNLevf8AJ1g3l6EJJJe0hmecT5hOsNNxUQx0gKhJKAirLFbskJtT+eWHxM7UQx+vu+ctnZ/9rxfuQdhCRZCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.900800+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.4230/lipics.aft.2025.27.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2025.27) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Oriol Saguillo, Vahid Ghafouri, Lucianna Kiffer, and Guillermo Suarez-Tangil. “Un- ravelling the Probabilistic Forest: Arbitrage in Prediction Markets”. In:7th Confer- ence on Advances in Financial Technologies (AFT 2025). Ed. by Zeta Avari","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":69,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Oriol Saguillo, Vahid Ghafouri, Lucianna Kiffer, and Guillermo Suarez-Tangil. “Un- ravelling the Probabilistic Forest: Arbitrage in Prediction Markets”. In:7th Confer- ence on Advances in Financial Technologies (AFT 2025). Ed. by Zeta Avari","reconstructed_doi":"10.4230/lipics.aft.2025.27.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2025.27"},"severity":"advisory","ref_index":69,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.4230/lipics.aft.2025.27.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2025.27","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"2d59433455a1cc1eaab023f271e6921956798726b75c84527f6d3a2ee2dff10a","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2297,"event_type":"pith.integrity.v1","payload_sha256":"50825bc7ce879f7ad9100c021ec207798c5d54a56e3b6a9f78f25422ba334234","signature_b64":"8hQh310/PqUkvjHjH1vwlMyk/885uVIWWoG6VrYvKj4mm+csktllVIt2dP4Z3LkxIG4znk8DiKcnnuaUG5YyAA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.899576+00:00","payload":{"note":"Identifier '10.1145/3487552.3487811.url:https://doi.org/10.1145/3487552.3487811' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Kaihua Qin, Liyi Zhou, Pablo Gamito, Philipp Jovanovic, and Arthur Gervais. “An empirical study of DeFi liquidations: incentives, risks, and instabilities”. In:Proceed- ings of the 21st ACM Internet Measurement Conference. IMC ’21. Virtual ","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"doi":"10.1145/3487552.3487811.url:https://doi.org/10.1145/3487552.3487811","arxiv_id":null,"ref_index":63,"raw_excerpt":"Kaihua Qin, Liyi Zhou, Pablo Gamito, Philipp Jovanovic, and Arthur Gervais. “An empirical study of DeFi liquidations: incentives, risks, and instabilities”. In:Proceed- ings of the 21st ACM Internet Measurement Conference. IMC ’21. Virtual Event: As- sociation for Computing Machinery, 2021, pp. 336–350.isbn: 9781450391290.doi: 10.1145/3487552.3487811.url:https://doi.org/10.1145/3487552.3487811","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":63,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3487552.3487811.url:https://doi.org/10.1145/3487552.3487811","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"ce4c67bdab7b9c0ae7d0c8d6d964c9637a4544a14dfa0dbcf1ede156a691f5c9","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2296,"event_type":"pith.integrity.v1","payload_sha256":"95c8e71ca4a819194a75d33629600211cb82f22547aac232c04cd50defa470d7","signature_b64":"T4LDku5f4dNLS++CiCHwjouMs+nuSGiEoE5sYDqIdHMtT0PEGvD1ftndg8Ma1KwFmcyppk3QTjLgml+Pm8fxCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.898387+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3555776.3577655.url:https://doi.org/10.1145/3555776.3577655) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Ulysse Pavloff, Yackolley Amoussou-Guenou, and Sara Tucci-Piergiovanni. “Ethereum Proof-of-Stake under Scrutiny”. In:Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. SAC ’23. Tallinn, Estonia: Association for Computing Mac","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":59,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Ulysse Pavloff, Yackolley Amoussou-Guenou, and Sara Tucci-Piergiovanni. “Ethereum Proof-of-Stake under Scrutiny”. In:Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. SAC ’23. Tallinn, Estonia: Association for Computing Mac","reconstructed_doi":"10.1145/3555776.3577655.url:https://doi.org/10.1145/3555776.3577655"},"severity":"advisory","ref_index":59,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3555776.3577655.url:https://doi.org/10.1145/3555776.3577655","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"254655951b561b70b87bc7efbbb17f3f17353c0f0a46a9d7995fb810f2b3cad7","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2295,"event_type":"pith.integrity.v1","payload_sha256":"a9f20f19fee7dd0b45979a4eefb88e13efba293629d9bb697484ef06c8390f7a","signature_b64":"gwXZBPW5U28Q6dXWJkVeM3MaDmc0hI4bw3cHdPtBSuHCAUkBaIuPTZ1B26LCDoIXo7i7FmCMxfif5WVhFYZaAA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.897183+00:00","payload":{"note":"Identifier '10.1145/3771566.url:https://doi.org/10.1145/3771566' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Burak Öz, Christof Ferreira Torres, Christoph Schlegel, Bruno Mazorra, Jonas Gebele, Filip Rezabek, and Florian Matthes. “Cross-Chain Arbitrage: The Next Frontier of MEV in Decentralized Finance”. In:Proc. ACM Meas. Anal. Comput. Syst.9.3 (","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"doi":"10.1145/3771566.url:https://doi.org/10.1145/3771566","arxiv_id":null,"ref_index":58,"raw_excerpt":"Burak Öz, Christof Ferreira Torres, Christoph Schlegel, Bruno Mazorra, Jonas Gebele, Filip Rezabek, and Florian Matthes. “Cross-Chain Arbitrage: The Next Frontier of MEV in Decentralized Finance”. In:Proc. ACM Meas. Anal. Comput. Syst.9.3 (Dec. 2025).doi:10.1145/3771566.url:https://doi.org/10.1145/3771566","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":58,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3771566.url:https://doi.org/10.1145/3771566","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"baf20e263c4aa9efdd483154f4f1884259515d6c6e9c3d227a4e640b93d54520","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2294,"event_type":"pith.integrity.v1","payload_sha256":"7b7be0b64c231b9bb24fd76aa18b5cf33647c646557cd1a6836028a81fe14029","signature_b64":"LOjvyXPilwY4U05Kx//xwUjWXZbcrnNo0ClisI8LTuCr6JN3kuWzaTCPBl+U5BVFUH9AL9u4+rRybyR4Ra3FDQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.896128+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.4230/LIPIcs.AFT.2024.22.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2024.22) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Burak Öz, Danning Sui, Thomas Thiery, and Florian Matthes. “Who Wins Ethereum Block Building Auctions and Why?” In:6th Conference on Advances in Financial Technologies (AFT 2024). Ed. by Rainer Böhme and Lucianna Kiffer. Vol. 316. Leib- niz","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":57,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Burak Öz, Danning Sui, Thomas Thiery, and Florian Matthes. “Who Wins Ethereum Block Building Auctions and Why?” In:6th Conference on Advances in Financial Technologies (AFT 2024). Ed. by Rainer Böhme and Lucianna Kiffer. Vol. 316. Leib- niz","reconstructed_doi":"10.4230/LIPIcs.AFT.2024.22.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2024.22"},"severity":"advisory","ref_index":57,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.4230/LIPIcs.AFT.2024.22.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2024.22","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"31fbf44b7f46b459781404b3d3b0f79d8ff6f244fcd63027379d8c018e4beef2","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2293,"event_type":"pith.integrity.v1","payload_sha256":"c5828f6a7f01aa52030bddc9c00a80ad8e12d922a1b688c323f1dcc6e4272f34","signature_b64":"yljgSiMza8qCIL1GYSoDbJ9qtdEv/27j/aBwMd3doYA8xRYqKo3BB/bUitp0xNn9PkygY7IBL1Ha08jOXQMEBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.895053+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1145/3719027.3744852.url:https://doi.org/10.1145/3719027.3744852) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Ábel Nagy, János Tapolcai, István András Seres, and Bence Ladóczki. “Forking the RANDAO: Manipulating Ethereum’s Distributed Randomness Beacon”. In:Proceed- ings of the 2025 ACM SIGSAC Conference on Computer and Communications Secu- rity. C","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":52,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Ábel Nagy, János Tapolcai, István András Seres, and Bence Ladóczki. “Forking the RANDAO: Manipulating Ethereum’s Distributed Randomness Beacon”. In:Proceed- ings of the 2025 ACM SIGSAC Conference on Computer and Communications Secu- rity. C","reconstructed_doi":"10.1145/3719027.3744852.url:https://doi.org/10.1145/3719027.3744852"},"severity":"advisory","ref_index":52,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1145/3719027.3744852.url:https://doi.org/10.1145/3719027.3744852","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"3b97ab401bacf42e170cb5dc9cdc374ab7d4256de511c082ded4c824241f9495","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2292,"event_type":"pith.integrity.v1","payload_sha256":"2a2227302bf860a6651364bfb48c112c76d252ba705b5b5f15a1cbe3f5e32fd5","signature_b64":"64XtUp71Iysbm3igCWVbKWcUjKscNgg+H7zszsjaAu5ZTIftLbPTPeUk/NsZNDdE8NFLlBkEXS5MhtowtkD2Cw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.893757+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.48550/arXiv.1910.08820.url:http://arxiv.org/abs/1910.08820) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Bryan Ford and Rainer Böhme.Rationality is Self-Defeating in Permissionless Sys- tems. Oct. 2019.doi:10.48550/arXiv.1910.08820.url:http://arxiv.org/abs/ 1910.08820","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":36,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Bryan Ford and Rainer Böhme.Rationality is Self-Defeating in Permissionless Sys- tems. Oct. 2019.doi:10.48550/arXiv.1910.08820.url:http://arxiv.org/abs/ 1910.08820","reconstructed_doi":"10.48550/arXiv.1910.08820.url:http://arxiv.org/abs/1910.08820"},"severity":"advisory","ref_index":36,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.48550/arXiv.1910.08820.url:http://arxiv.org/abs/1910.08820","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"1f3062a5735db98821c2628975186752c10de0dbf0349a596b9de0e86cfc0be9","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2291,"event_type":"pith.integrity.v1","payload_sha256":"afd3182ae5cd3c9adf7aebc1e79784b0d94de9f7a2c7a0b5a9a9586796e6f15d","signature_b64":"okrOjORtvC77bWeLKO2/mJzG9rOyr/YkaGOCjhgw84acELAaPiHPz9eZXYZWucoaCgVLL1crtKkgkSh21w4BCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.892621+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/SP61157.2025.00061.url:https://www.computer.org/csdl/proceedings-article/sp/2025/223600a061/21B7R6HnWWk) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Wanning Ding, Yuzhe Tang, and Yibo Wang. “Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs”. English. In:2025 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 2025, pp. 1584–1602.isbn: 97983","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":24,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Wanning Ding, Yuzhe Tang, and Yibo Wang. “Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs”. English. In:2025 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 2025, pp. 1584–1602.isbn: 97983","reconstructed_doi":"10.1109/SP61157.2025.00061.url:https://www.computer.org/csdl/proceedings-article/sp/2025/223600a061/21B7R6HnWWk"},"severity":"advisory","ref_index":24,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/SP61157.2025.00061.url:https://www.computer.org/csdl/proceedings-article/sp/2025/223600a061/21B7R6HnWWk","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"5764aaa9b305602031b704b4ba0aa6d39ae23b427a19e4c6eb18a8bc0dad8c26","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2290,"event_type":"pith.integrity.v1","payload_sha256":"7c9d716b9ab6ec9cdeaf10356454be6c8903e0f87a1e0c2594a0e3e05ef83a26","signature_b64":"nC+45c60Y02W+V0IzzMDTT6q7FW2+nqmBaIaCHzXcaRyb4BR3qzVF6JjNLyRpIoAUViwuAFlwO80S96L3SeeCA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.891559+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/j.tcs.2019.02.001.url:https://www.sciencedirect.com/science/article/pii/S030439751930091X) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Jing Chen and Silvio Micali. “Algorand: A secure and efficient distributed ledger”. In:Theoretical Computer Science. In memory of Maurice Nivat, a founding father of Theoretical Computer Science - Part I 777 (2019), pp. 155–183.issn: 0304-3","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":17,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Jing Chen and Silvio Micali. “Algorand: A secure and efficient distributed ledger”. In:Theoretical Computer Science. In memory of Maurice Nivat, a founding father of Theoretical Computer Science - Part I 777 (2019), pp. 155–183.issn: 0304-3","reconstructed_doi":"10.1016/j.tcs.2019.02.001.url:https://www.sciencedirect.com/science/article/pii/S030439751930091X"},"severity":"advisory","ref_index":17,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.tcs.2019.02.001.url:https://www.sciencedirect.com/science/article/pii/S030439751930091X","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"f91f69f9dafa035cf7fec88ab95b9d1562f76ea2865128da09e79781685df1b4","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2289,"event_type":"pith.integrity.v1","payload_sha256":"4858d5815d7064ff2d76d442685876496633874eadb06b1ed11e331a5d48db10","signature_b64":"/xLlGl6PjO70+u32dSLMO4lz+PFPGfsFuxDOXlfegSSCZzg/0LkqsaIJPu8+H0Gf4+ACGZ0mhxaK4Q6BsWHpBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.890475+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-47751-5_9.url:https://doi.org/10.1007/978-3-031-47751-5_9) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Tong Cao, Jérémie Decouchant, and Jiangshan Yu. “Leveraging the verifier’s dilemma to double spend in Bitcoin”. In:Financial Cryptography and Data Security: 27th In- ternational Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revise","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":16,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Tong Cao, Jérémie Decouchant, and Jiangshan Yu. “Leveraging the verifier’s dilemma to double spend in Bitcoin”. In:Financial Cryptography and Data Security: 27th In- ternational Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revise","reconstructed_doi":"10.1007/978-3-031-47751-5_9.url:https://doi.org/10.1007/978-3-031-47751-5_9"},"severity":"advisory","ref_index":16,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-031-47751-5_9.url:https://doi.org/10.1007/978-3-031-47751-5_9","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"c9cd4eb318384c3bccbce634a47c7253dc2ab8fe516b90e95c708ca42d456a17","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2288,"event_type":"pith.integrity.v1","payload_sha256":"240bd938b8f4d18929db4567143fbd58f360162dae832ce0166df5fafcfeaa40","signature_b64":"dZ2qkHbeQdvqJC9utRa47VByIPgXgtP74SjgVd8wzDxd9QEMYRKCRdvd/1JvVVsUMkTuuMEerN7hoBzd8ZCqAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.889347+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.4230/lipics.aft.2024.30.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2024.30) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Linda Cai, Jingyi Liu, S. Matthew Weinberg, and Chenghan Zhou. “Profitable Manip- ulations of Cryptographic Self-Selection Are Statistically Detectable”. In:6th Confer- ence on Advances in Financial Technologies (AFT 2024). Ed. by Rainer Bö","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":15,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Linda Cai, Jingyi Liu, S. Matthew Weinberg, and Chenghan Zhou. “Profitable Manip- ulations of Cryptographic Self-Selection Are Statistically Detectable”. In:6th Confer- ence on Advances in Financial Technologies (AFT 2024). Ed. by Rainer Bö","reconstructed_doi":"10.4230/lipics.aft.2024.30.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2024.30"},"severity":"advisory","ref_index":15,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.4230/lipics.aft.2024.30.url:https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2024.30","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"cda11ab6f8038ceb2f0e017931c071f08031ac36d81a0e944bf04aced84f7205","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2287,"event_type":"pith.integrity.v1","payload_sha256":"742ab0c751a103e869f2a44739b4618f18c1d5c5937ba0a6c65cfe66498946db","signature_b64":"iODJGTvwT2hyK+oqGCN5ankrRjDgkr6S/V7T61D7GrhzR82WEEYFafJ1OPRlh6O8avEHhy1pbk22+e5KWFN+Bw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.888038+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/SPW59333.2023.00008.url:https://ieeexplore.ieee.org/abstract/document/10188634) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Roi Bar-Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, and Aviv Tamar. “Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL”. In:2023 IEEE Security and Privacy Workshops (SPW). 2023, pp. 29–37.doi:10.1109/SPW59333. 2","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":6,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Roi Bar-Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, and Aviv Tamar. “Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL”. In:2023 IEEE Security and Privacy Workshops (SPW). 2023, pp. 29–37.doi:10.1109/SPW59333. 2","reconstructed_doi":"10.1109/SPW59333.2023.00008.url:https://ieeexplore.ieee.org/abstract/document/10188634"},"severity":"advisory","ref_index":6,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/SPW59333.2023.00008.url:https://ieeexplore.ieee.org/abstract/document/10188634","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"3a0faf87612a17bab2deafbcd372a29860cec66a10c94f1855879c358373504e","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":2286,"event_type":"pith.integrity.v1","payload_sha256":"37ea93a129f7ed513155b0857f683d0bbd01ac423bd1846195c25c1a153556ae","signature_b64":"xZD+vA7QrrKPv3izOXQSDoGhKdAtJSLvG8Sqy24pyOUCzOEk1UYZeIaV0hz3ii3BnO7u1IC86mm3n7Gpa+XyDA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T17:42:15.886675+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1109/SP46215.2023.10179444.url:https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.10179444) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Roi Bar-Zur, Ameer Abu-Hanna, Ittay Eyal, and Aviv Tamar. “ WeRLman: To Tackle Whale (Transactions), Go Deep (RL) ”. In:2023 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA, USA: IEEE Computer Society, 2023, pp. 93–110. doi:10","arxiv_id":"2605.01025","detector":"doi_compliance","evidence":{"ref_index":5,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Roi Bar-Zur, Ameer Abu-Hanna, Ittay Eyal, and Aviv Tamar. “ WeRLman: To Tackle Whale (Transactions), Go Deep (RL) ”. In:2023 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA, USA: IEEE Computer Society, 2023, pp. 93–110. doi:10","reconstructed_doi":"10.1109/SP46215.2023.10179444.url:https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.10179444"},"severity":"advisory","ref_index":5,"audited_at":"2026-05-19T17:41:47.135511Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/SP46215.2023.10179444.url:https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.10179444","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"5c674b27c0f4e1034ea6e8605659d64cca4bcff7794fc9ce56824d36dbbf0161","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.01025/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}